Statistical higher-order correlation attacks against code-based masking
Masking is one of the most well-established methods to thwart side-channel attacks. Many
masking schemes have been proposed in the literature, and code-based masking emerges …
masking schemes have been proposed in the literature, and code-based masking emerges …
Circuit masking: from theory to standardization, a comprehensive survey for hardware security researchers and practitioners
Side-channel attacks extracting sensitive data from implementations have been considered
a major threat to the security of cryptographic schemes. This has elevated the need for …
a major threat to the security of cryptographic schemes. This has elevated the need for …
Polynomial sharings on two secrets: Buy one, get one free
P Arnold, S Berndt, T Eisenbarth… - IACR Transactions on …, 2024 - philosophymindscience.org
While passive side-channel attacks and active fault attacks have been studied intensively in
the last few decades, strong attackers combining these attacks have only been studied …
the last few decades, strong attackers combining these attacks have only been studied …
Information leakages in code-based masking: A unified quantification approach
This paper presents a unified approach to quantifying the information leakages in the most
general code-based masking schemes. Specifically, by utilizing a uniform representation …
general code-based masking schemes. Specifically, by utilizing a uniform representation …
On efficient and secure code-based masking: A pragmatic evaluation
Code-based masking is a highly generalized type of masking schemes, which can be
instantiated into specific cases by assigning different encoders. It captivates by its side …
instantiated into specific cases by assigning different encoders. It captivates by its side …
Information leakage in code-based masking: A systematic evaluation by higher-order attacks
Code-based masking is a recent line of research on masking schemes aiming at provably
counteracting side-channel attacks. It generalizes and unifies many masking schemes within …
counteracting side-channel attacks. It generalizes and unifies many masking schemes within …
Generalized feistel ciphers for efficient prime field masking-full version
A recent work from Eurocrypt 2023 suggests that prime-field masking has excellent potential
to improve the efficiency vs. security tradeoff of masked implementations against side …
to improve the efficiency vs. security tradeoff of masked implementations against side …
Optimizing higher-order correlation analysis against inner product masking scheme
In recent years, inner product masking (IPM) has been proposed as a promising code based
masking scheme against side-channel attacks. However, most studies mainly focus on …
masking scheme against side-channel attacks. However, most studies mainly focus on …
Generalized Feistel Ciphers for Efficient Prime Field Masking
A recent work from Eurocrypt 2023 suggests that prime-field masking has excellent potential
to improve the efficiency vs. security tradeoff of masked implementations against side …
to improve the efficiency vs. security tradeoff of masked implementations against side …
Redundant code-based masking revisited
N Costes, M Stam - IACR Transactions on Cryptographic Hardware …, 2021 - tches.iacr.org
Masking schemes are a popular countermeasure against side-channel attacks. To mask
bytes, the two classical options are Boolean masking and polynomial masking. The latter …
bytes, the two classical options are Boolean masking and polynomial masking. The latter …